Michalis Faloutsos

Orcid: 0000-0002-3882-9987

Affiliations:
  • University of California, Riverside, USA


According to our database1, Michalis Faloutsos authored at least 212 papers between 1995 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Disambiguating usernames across platforms: the GeekMAN approach.
Soc. Netw. Anal. Min., December, 2024

The Distribution Is the Performance.
Computer, April, 2024

What Is Being Argued (WIBA)? An Application to Legislative Deliberation in the U.S. Congress.
CoRR, 2024

WIBA: What Is Being Argued? A Comprehensive Approach to Argument Mining.
CoRR, 2024

Unveiling A Hidden Risk: Exposing Educational but Malicious Repositories in GitHub.
CoRR, 2024

Who is Creating Malware Repositories on GitHub and Why?
Proceedings of the Companion Proceedings of the ACM on Web Conference 2024, 2024

MalFusion: Simple String Manipulations Confuse Malware Detection.
Proceedings of the IFIP Networking Conference, 2024

ArguSense: Argument-Centric Analysis of Online Discourse.
Proceedings of the Eighteenth International AAAI Conference on Web and Social Media, 2024

C2Miner: Tricking IoT Malware into Revealing Live Command & Control Servers.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2023
C2Store: C2 Server Profiles at Your Fingertips.
PACMNET, 2023

Revisiting Performance Evaluation in the Age of Uncertainty.
Proceedings of the 30th IEEE International Conference on High Performance Computing, 2023

RURLMAN: Matching Forum Users Across Platforms Using Their Posted URLs.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2023

GeekMAN: Geek-oriented username Matching Across online Networks.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2023

2022
HyperMan: detecting misbehavior in online forums based on hyperlink posting behavior.
Soc. Netw. Anal. Min., 2022

MalNet: a binary-centric network-level profiling of IoT malware.
Proceedings of the 22nd ACM Internet Measurement Conference, 2022

URLytics: Profiling Forum Users from their Posted URLs.
Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2022

PIMan: A Comprehensive Approach for Establishing Plausible Influence among Software Repositories.
Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2022

Wheats the Deal? Understanding the GMO debate in online forums.
Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2022

IKEA: Unsupervised domain-specific keyword-expansion.
Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2022

2021
HackerScope: the dynamics of a massive hacker online ecosystem.
Soc. Netw. Anal. Min., 2021

DisCo: Combining Disassemblers for Improved Performance.
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021

RAFFMAN: Measuring and Analyzing Sentiment in Online Political Forum Discussions with an Application to the Trump Impeachment.
Proceedings of the Fifteenth International AAAI Conference on Web and Social Media, 2021

RecTen: A Recursive Hierarchical Low Rank Tensor Factorization Method to Discover Hierarchical Patterns from Multi-modal Data.
Proceedings of the Fifteenth International AAAI Conference on Web and Social Media, 2021

Repo2Vec: A Comprehensive Embedding Approach for Determining Repository Similarity.
Proceedings of the IEEE International Conference on Software Maintenance and Evolution, 2021

SentiStance: quantifying the intertwined changes of sentiment and stance in response to an event in online forums.
Proceedings of the ASONAM '21: International Conference on Advances in Social Networks Analysis and Mining, Virtual Event, The Netherlands, November 8, 2021

<i>LinkMan</i>: hyperlink-driven misbehavior detection in online security forums.
Proceedings of the ASONAM '21: International Conference on Advances in Social Networks Analysis and Mining, Virtual Event, The Netherlands, November 8, 2021

2020
Mobility Map Inference from Thermal Modeling of a Building.
CoRR, 2020

RecTen: A Recursive Hierarchical Low Rank Tensor Factorization Method to Discover Hierarchical Patterns in Multi-modal Data.
CoRR, 2020

SourceFinder: Finding Malware Source-Code from Publicly Available Repositories.
CoRR, 2020

Opening Digital Borders Cautiously yet Decisively: Digital Filtering in Saudi Arabia.
Proceedings of the 10th USENIX Workshop on Free and Open Communications on the Internet, 2020

SourceFinder: Finding Malware Source-Code from Publicly Available Repositories in GitHub.
Proceedings of the 23rd International Symposium on Research in Attacks, 2020

REST: A Thread Embedding Approach for Identifying and Classifying User-Specified Information in Security Forums.
Proceedings of the Fourteenth International AAAI Conference on Web and Social Media, 2020

RIoTMAN: a systematic analysis of IoT malware behavior.
Proceedings of the CoNEXT '20: The 16th International Conference on emerging Networking EXperiments and Technologies, 2020

RThread: A thread-centric analysis of security forums.
Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2020

TenFor: A Tensor-Based Tool to Extract Interesting Events from Security Forums.
Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2020

2019
An Empirical Study of Malicious Threads in Security Forums.
Proceedings of the Companion of The 2019 World Wide Web Conference, 2019

Extracting actionable information from Security Forums.
Proceedings of the Companion of The 2019 World Wide Web Conference, 2019

IDAPro for IoT Malware analysis?
Proceedings of the 12th USENIX Workshop on Cyber Security Experimentation and Test, 2019

2018
Mining actionable information from security forums: the case of malicious IP addresses.
CoRR, 2018

RARE: A Systematic Augmented Router Emulation for Malware Analysis.
Proceedings of the Passive and Active Measurement - 19th International Conference, 2018

RIPEx: Extracting Malicious IP Addresses from Security Forums Using Cross-Forum Learning.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2018

FAROS: Illuminating In-memory Injection Attacks via Provenance-Based Whole-System Dynamic Information Flow Tracking.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018

MIMiS: Minimally Intrusive Mining of Smartphone User Behaviors.
Proceedings of the IEEE/ACM 2018 International Conference on Advances in Social Networks Analysis and Mining, 2018

2017
Facebook wall posts: a model of user behaviors.
Soc. Netw. Anal. Min., 2017

Improving Smartphone Security and Reliability.
J. Interconnect. Networks, 2017

Characterizing the behavior of handheld devices and its implications.
Comput. Networks, 2017

Behavioral anomaly detection of malware on home routers.
Proceedings of the 12th International Conference on Malicious and Unwanted Software, 2017

TrollSpot: Detecting misbehavior in commenting platforms.
Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017, Sydney, Australia, July 31, 2017

InferIP: Extracting actionable information from security discussion forums.
Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017, Sydney, Australia, July 31, 2017

One Size Does Not Fit All: Profiling Personalized Time-Evolving User Behaviors.
Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017, Sydney, Australia, July 31, 2017

2016
Detecting Malicious Facebook Applications.
IEEE/ACM Trans. Netw., 2016

Eigen-Optimization on Large Graphs by Edge Manipulation.
ACM Trans. Knowl. Discov. Data, 2016

Comment-Profiler: Detecting Trends and Parasitic Behaviors in Online Comments.
Proceedings of the Social Informatics - 8th International Conference, 2016

Cross-layer personalization as a first-class citizen for situation awareness and computer infrastructure security.
Proceedings of the 2016 New Security Paradigms Workshop, 2016

"Infect-me-not": A user-centric and site-centric study of web-based malware.
Proceedings of the 2016 IFIP Networking Conference, 2016

2015
TrueView: Harnessing the Power of Multiple Review Sites.
Proceedings of the 24th International Conference on World Wide Web, 2015

TrackAdvisor: Taking Back Browsing Privacy from Third-Party Trackers.
Proceedings of the Passive and Active Measurement - 16th International Conference, 2015

A behavior-aware profiling of handheld devices.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Whom Does Your Android App Talk To?
Proceedings of the 2015 IEEE Global Communications Conference, 2015

If walls could talk: Patterns and anomalies in Facebook wallposts.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

2014
Which phone will you get next: Observing trends and predicting the choice.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014

Determining Developers' Expertise and Role: A Graph Hierarchy-Based Approach.
Proceedings of the 30th IEEE International Conference on Software Maintenance and Evolution, Victoria, BC, Canada, September 29, 2014

The socio-monetary incentives of online social network malware campaigns.
Proceedings of the second ACM conference on Online social networks, 2014

Scanner hunter: understanding HTTP scanning traffic.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

2013
An integrated routing and rate adaptation framework for multi-rate multi-hop wireless networks.
Wirel. Networks, 2013

iDispatcher: A unified platform for secure planet-scale information dissemination.
Peer-to-Peer Netw. Appl., 2013

Competing Memes Propagation on Networks: A Network Science Perspective.
IEEE J. Sel. Areas Commun., 2013

Analyzing Communication Interaction Networks (CINs) in enterprises and inferring hierarchies.
Comput. Networks, 2013

An analysis of socware cascades in online social networks.
Proceedings of the 22nd International World Wide Web Conference, 2013

Detecting malware with graph-based methods: traffic classification, botnets, and facebook scams.
Proceedings of the 22nd International World Wide Web Conference, 2013

Smartphone viruses propagation on heterogeneous composite networks.
Proceedings of the 2nd IEEE Network Science Workshop, 2013

ReSurf: Reconstructing web-surfing activity from network traffic.
Proceedings of the IFIP Networking Conference, 2013, Brooklyn, 2013

Entelecheia: Detecting P2P botnets in their waiting stage.
Proceedings of the IFIP Networking Conference, 2013, Brooklyn, 2013

Inferring cellular user demographic information using homophily on call graphs.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

On the usage patterns of multi-modal communication: Countries and evolution.
Proceedings of the 2013 Proceedings IEEE INFOCOM Workshops, 2013

On the usage patterns of multimodal communication: Countries and evolution.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

2012
Obtaining Provably Legitimate Internet Topologies.
IEEE/ACM Trans. Netw., 2012

Link Positions Matter: A Noncommutative Routing Metric for Wireless Mesh Networks.
IEEE Trans. Mob. Comput., 2012

Threshold conditions for arbitrary cascade models on arbitrary networks.
Knowl. Inf. Syst., 2012

Competing memes propagation on networks: a case study of composite networks.
Comput. Commun. Rev., 2012

Efficient and Scalable Socware Detection in Online Social Networks.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

SyFi: A Systematic Approach for Estimating Stateful Firewall Performance.
Proceedings of the Passive and Active Measurement - 13th International Conference, 2012

ProfileDroid: multi-layer profiling of android applications.
Proceedings of the 18th Annual International Conference on Mobile Computing and Networking, 2012

SubFlow: Towards practical flow-level traffic classification.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Graph-based analysis and prediction for software evolution.
Proceedings of the 34th International Conference on Software Engineering, 2012

Malicious Android Applications in the Enterprise: What Do They Do and How Do We Fix It?
Proceedings of the Workshops Proceedings of the IEEE 28th International Conference on Data Engineering, 2012

FRAppE: detecting malicious facebook applications.
Proceedings of the Conference on emerging Networking Experiments and Technologies, 2012

Gelling, and melting, large graphs by edge manipulation.
Proceedings of the 21st ACM International Conference on Information and Knowledge Management, 2012

Permission evolution in the Android ecosystem.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2011
Graption: A graph-based P2P traffic classification framework for the internet backbone.
Comput. Networks, 2011

SUT: Quantifying and mitigating URL typosquatting.
Comput. Networks, 2011

Coping with packet replay attacks in wireless networks.
Proceedings of the 8th Annual IEEE Communications Society Conference on Sensor, 2011

Epidemic Spread in Mobile Ad Hoc Networks: Determining the Tipping Point.
Proceedings of the NETWORKING 2011, 2011

A Unified Metric for Routing and Rate Adaptation in Multi-Rate Wireless Mesh Networks.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011

PhishDef: URL names say it all.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Network-level characteristics of spamming: An empirical analysis.
Proceedings of the 19th annual IEEE International Conference on Network Protocols, 2011

XLR: Tackling the Inefficiency of Landmark-Based Routing in Large Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2011

2010
Downlink capacity of hybrid cellular ad hoc networks.
IEEE/ACM Trans. Netw., 2010

Measurement-Driven Guidelines for 802.11 WLAN Design.
IEEE/ACM Trans. Netw., 2010

Online social networks.
IEEE Netw., 2010

On the Uplink Capacity of Hybrid Cellular Ad Hoc Networks.
Proceedings of the Seventh Annual IEEE Communications Society Conference on Sensor, 2010

Virus Propagation on Time-Varying Networks: Theory and Immunization Algorithms.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2010

A simple conceptual generator for the Internet graph.
Proceedings of the 17th IEEE Workshop on Local and Metropolitan Area Networks, 2010

Link Homophily in the Application Layer and its Usage in Traffic Classification.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Characterizing the Scam Hosting Infrastructure.
Proceedings of the Global Communications Conference, 2010

Profiling-By-Association: a resilient traffic profiling solution for the internet backbone.
Proceedings of the 2010 ACM Conference on Emerging Networking Experiments and Technology, 2010

2009
Internet Topology.
Proceedings of the Encyclopedia of Complexity and Systems Science, 2009

Lord of the links: a framework for discovering missing links in the internet topology.
IEEE/ACM Trans. Netw., 2009

A Simple Conceptual Generator for the Internet Graph
CoRR, 2009

You must be joking...: is only getting started.
Comput. Commun. Rev., 2009

You must be joking...: the poetry of science.
Comput. Commun. Rev., 2009

You must be joking...: is change.
Comput. Commun. Rev., 2009

Impact of IT monoculture on behavioral end host intrusion detection.
Proceedings of the 1st ACM SIGCOMM 2009 Workshop on Research on Enterprise Networking, 2009

BGP-lens: patterns and anomalies in internet routing updates.
Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, France, June 28, 2009

Exploiting dynamicity in graph-based traffic analysis: techniques and applications.
Proceedings of the 2009 ACM Conference on Emerging Networking Experiments and Technology, 2009

2008
The P2P war: Someone is monitoring your activities.
Comput. Networks, 2008

You must be joking...: believes.
Comput. Commun. Rev., 2008

You must be joking...: interview this.
Comput. Commun. Rev., 2008

You must be joking...: cares about the endangered species.
Comput. Commun. Rev., 2008

Assessing link quality in IEEE 802.11 Wireless Networks: Which is the right metric?
Proceedings of the IEEE 19th International Symposium on Personal, 2008

Characterizing and Modelling Clustering Features in AS-Level Internet Topology.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

Capacity of Hybrid Cellular-Ad Hoc Data Networks.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

Link Positions Matter: A Noncommutative Routing Metric for Wireless Mesh Network.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

Policy-Aware Topologies for Efficient Inter-Domain Routing Evaluations.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

Cyber-Fraud is One Typo Away.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

Internet traffic classification demystified: myths, caveats, and the best practices.
Proceedings of the 2008 ACM Conference on Emerging Network Experiment and Technology, 2008

2007
DART: dynamic address routing for scalable ad hoc and mesh networks.
IEEE/ACM Trans. Netw., 2007

Understanding and Exploiting the Trade-Offs between Broadcasting and Multicasting in Mobile Ad Hoc Networks.
IEEE Trans. Mob. Comput., 2007

A Cross-Layer Framework for Exploiting Virtual MISO Links in Mobile Ad Hoc Networks.
IEEE Trans. Mob. Comput., 2007

Multiband Media Access Control in Impulse-Based UWB Ad Hoc Networks.
IEEE Trans. Mob. Comput., 2007

On broadcasting with cooperative diversity in multi-hop wireless networks.
IEEE J. Sel. Areas Commun., 2007

A novel adaptive protocol for lightweight efficient multicasting in ad hoc networks.
Comput. Networks, 2007

Sampling large Internet topologies for simulation purposes.
Comput. Networks, 2007

You must be joking: a historic open reviewing at global internet '07.
Comput. Commun. Rev., 2007

You must be joking...: why Alice killed Bob.
Comput. Commun. Rev., 2007

You must be joking... warns you: don't drink and type.
Comput. Commun. Rev., 2007

Clustering by common friends finds locally significant proteins mediating modules.
Bioinform., 2007

A Blueprint for a Manageable and Affordable Wireless Testbed: Design, Pitfalls and Lessons Learned.
Proceedings of the 3rd International ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, 2007

Profiling the End Host.
Proceedings of the Passive and Active Network Measurement, 8th Internatinoal Conference, 2007

Implications of Power Control in Wireless Networks: A Quantitative Study.
Proceedings of the Passive and Active Network Measurement, 8th Internatinoal Conference, 2007

A Systematic Framework for Unearthing the Missing Links: Measurements and Impact.
Proceedings of the 4th Symposium on Networked Systems Design and Implementation (NSDI 2007), 2007

Multiple Identities in BitTorrent Networks.
Proceedings of the NETWORKING 2007. Ad Hoc and Sensor Networks, 2007

Revisiting minimum cost reliable routing in wireless mesh networks.
Proceedings of the 13th Annual International Conference on Mobile Computing and Networking, 2007

MDG: measurement-driven guidelines for 802.11 wlan design.
Proceedings of the 13th Annual International Conference on Mobile Computing and Networking, 2007

Neighborhood Watch for Internet Routing: Can We Improve the Robustness of Internet Routing Today?
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

Information Survival Threshold in Sensor and P2P Networks.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

Network monitoring using traffic dispersion graphs (tdgs).
Proceedings of the 7th ACM SIGCOMM Internet Measurement Conference, 2007

Routing amid Colluding Attackers.
Proceedings of the IEEE International Conference on Network Protocols, 2007

2006
A new binary conflict resolution-based MAC protocol for impulse-based UWB ad hoc networks.
Wirel. Commun. Mob. Comput., 2006

Jellyfish: A conceptual model for the as Internet topology.
J. Commun. Networks, 2006

AQoSM: Scalable QoS multicast provisioning in Diff-Serv networks.
Comput. Networks, 2006

You must be joking...: the most serious column strikes back.
Comput. Commun. Rev., 2006

You must be joking...: should the internet have an ON/OFF switch?
Comput. Commun. Rev., 2006

You must be joking... dares to ask: hey, internet, who's your daddy?
Comput. Commun. Rev., 2006

Public real data repositories and measurement tools.
Comput. Commun. Rev., 2006

You must be joking: the most serious editorial column ever.
Comput. Commun. Rev., 2006

Public review for the internet AS-level topology: three data sources and one definitive metric.
Comput. Commun. Rev., 2006

Application versus network layer multicasting in ad hoc networks: the ALMA routing protocol.
Ad Hoc Networks, 2006

Overcoming the challenge of security in a mobile environment.
Proceedings of the 25th IEEE International Performance Computing and Communications Conference, 2006

BiToS: Enhancing BitTorrent for Supporting Streaming Applications.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

A Framework for Distributed Spatio-Temporal Communications in Mobile Ad Hoc Networks.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

TrueLink: A Practical Countermeasure to the Wormhole Attack in Wireless Networks.
Proceedings of the 14th IEEE International Conference on Network Protocols, 2006

"Dude, where's my Peer?".
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

2005
Performance Evaluation of a New MAC Protocol for the CDMA Interconnection Network.
Telecommun. Syst., 2005

The case for a systematic approach to wireless mobile network simulation.
J. High Speed Networks, 2005

Local versus global power adaptive broadcasting in ad hoc networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005

BLINC: multilevel traffic classification in the dark.
Proceedings of the ACM SIGCOMM 2005 Conference on Applications, 2005

A multiband mac protocol for impulse-based UWB ad hoc networks.
Proceedings of the Second Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2005

Fireworks: An Adaptive Group Communications Protocol for Mobile Ad Hoc Networks.
Proceedings of the NETWORKING 2005: Networking Technologies, 2005

Reducing Large Internet Topologies for Faster Simulations.
Proceedings of the NETWORKING 2005: Networking Technologies, 2005

Justice: Flexible and Enforceable Per-Source Bandwidth Allocation.
Proceedings of the NETWORKING 2005: Networking Technologies, 2005

On routing asymmetry in the Internet.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

Routing Scalability in MANETs.
Proceedings of the Handbook on Theoretical and Algorithmic Aspects of Sensor, 2005

2004
An architecture for scalable, efficient, and fast fault-tolerant multicast provisioning.
IEEE Netw., 2004

Long-Range Dependence: Ten Years of Internet Traffic Modeling.
IEEE Internet Comput., 2004

A linear-time optimal-message distributed algorithm for minimum spanning trees.
Distributed Comput., 2004

Improving the Performance of TCP in the Presence of Interacting UDP Flows in Ad Hoc Networks.
Proceedings of the NETWORKING 2004, 2004

Understanding the Interactions between Unicast and Group Communications Sessions in Ad Hoc Networks.
Proceedings of the Mobile and Wireless Communication Networks, 2004

TCP-friendly medium access control for ad-hoc wireless networks: alleviating self-contention.
Proceedings of the 2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems, 2004

Analyzing BGP Policies: Methodology and Tool.
Proceedings of the Proceedings IEEE INFOCOM 2004, 2004

A Nonstationary Poisson View of Internet Traffic.
Proceedings of the Proceedings IEEE INFOCOM 2004, 2004

Understanding the Effects of Hotspots in Wireless Cellular Networks.
Proceedings of the Proceedings IEEE INFOCOM 2004, 2004

Scalable Ad Hoc Routing: The Case for Dynamic Addressing.
Proceedings of the Proceedings IEEE INFOCOM 2004, 2004

Transport layer identification of P2P traffic.
Proceedings of the 4th ACM SIGCOMM Internet Measurement Conference, 2004

Is P2P dying or just hiding? [P2P traffic measurement].
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

Quantifying routing asymmetry in the Internet at the AS level.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

2003
Power laws and the AS-level internet topology.
IEEE/ACM Trans. Netw., 2003

A user-friendly self-similarity analysis tool.
Comput. Commun. Rev., 2003

PeerNet: Pushing Peer-to-Peer Down the Stack.
Proceedings of the Peer-to-Peer Systems II, Second International Workshop, 2003

Measuring and modelling the group mmbership in the internet.
Proceedings of the 3rd ACM SIGCOMM Internet Measurement Conference, 2003

Power Adaptive Broadcasting with Local Information in Ad Hoc Networks.
Proceedings of the 11th IEEE International Conference on Network Protocols (ICNP 2003), 2003

Sampling Internet Topologies: How Small Can We Go?
Proceedings of the International Conference on Internet Computing, 2003

2002
Using statistical data for reliable mobile communications.
Wirel. Commun. Mob. Comput., 2002

QoS-aware multicast routing for the internet: the design and evaluation of QoSMIC.
IEEE/ACM Trans. Netw., 2002

The Effect of Asymmetry on the On-Line Multicast Routing Problem.
Int. J. Found. Comput. Sci., 2002

Understanding Wireless Mobile Systems: A Simplified Simulation Approach.
Proceedings of the Distributed Computing, 2002

BGP routing: a study at large time scale.
Proceedings of the Global Telecommunications Conference, 2002

Split TCP for mobile ad hoc networks.
Proceedings of the Global Telecommunications Conference, 2002

Long-range dependence: now you see it, now you don't!
Proceedings of the Global Telecommunications Conference, 2002

Scalable QoS multicast provisioning in Diff-Serv-supported MPLS networks.
Proceedings of the Global Telecommunications Conference, 2002

2001
Aggregated Multicast with Inter-Group Tree Sharing.
Proceedings of the Networked Group Communication, 2001

Performance evaluation of mobile wireless networks: a new perspective.
Proceedings of the 4th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2001

Aggregated Multicast for Scalable QoS Multicast Provisioning.
Proceedings of the Evolutionary Trends of the Internet, 2001

A simple conceptual model for the Internet topology.
Proceedings of the Global Telecommunications Conference, 2001

Aggregated multicast: an approach to reduce multicast state.
Proceedings of the Global Telecommunications Conference, 2001

1999
The greedy, the naive, and the optimal multicast routing : from theory to internet protocols.
PhD thesis, 1999

On Power-law Relationships of the Internet Topology.
Proceedings of the ACM SIGCOMM 1999 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 30, 1999

1998
QoSMIC: Quality of Service Sensitive Multicast Internet Protocol.
Proceedings of the ACM SIGCOMM 1998 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 31, 1998

1997
Bounds for the On-line Multicast Problem in Directed Graphs.
Proceedings of the SIROCCO'97, 1997

1996
What features really make distributed minimum spanning tree algorithms efficient?.
Proceedings of the 1996 International Conference on Parallel and Distributed Systems (ICPADS '96), 1996

BIVTECI: a bibliographic visualization tool.
Proceedings of the 1996 conference of the Centre for Advanced Studies on Collaborative Research, 1996

1995
Optimal Distributed Algorithm for Minimum Spanning Trees Revisited.
Proceedings of the Fourteenth Annual ACM Symposium on Principles of Distributed Computing, 1995


  Loading...